Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1 ......................................................................................................................................................
.........................................................................................................................................................
2 ......................................................................................................................................................
.........................................................................................................................................................
3 ......................................................................................................................................................
..................................................................................................................................................... [3]
2 Many companies across the world have increasingly introduced computer systems into the office
environment. This has had a big effect on employees.
(a) Identify three ways in which this new technology has affected employees. In each case,
explain why it has had an impact.
1 ...............................................................................................................................................
..................................................................................................................................................
impact ......................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
impact ......................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
impact ......................................................................................................................................
..................................................................................................................................................
.............................................................................................................................................. [6]
© UCLES 2014
3
(b) Describe two health risks associated with increased use of computers.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(ii) < - - - - (b) - - - - > are programs that self-replicate (copy themselves) and are designed to
disrupt computer systems.
(iii) < - - - - (c) - - - -> is where a user is sent legitimate-looking emails; as soon as the email is
opened and the recipient clicks on the embedded link, they are sent to a fake website.
(iv) Software that monitors key presses on a user’s keyboard, and relays the information back to
the person who sent the software, is known as < - - - - (d) - - - - >.
(v) < - - - - (e) - - - - > is malicious code or software installed on the hard drive of a user’s
computer or on a web server; the code or software will re-direct the user to a fake website
without their knowledge.
Complete the five statements using words from the following list:
• cookies
• hacking
• pharming
• phishing
• spam
• spyware
• viruses
• web browsers
(a) .................................................................................................................................................[1]
(b) .................................................................................................................................................[1]
(c) .................................................................................................................................................[1]
(d) .................................................................................................................................................[1]
(e) .................................................................................................................................................[1]
© UCLES 2014
4
statement value
number of times the following
loop operates:
count = 1 1
repeat
input x
count = count + 1
until count = 5
4
the number of bits that make up
a byte
[5]
© UCLES 2014
6
10 total = 1
20 FOR x = 1 TO 500
30 IF number < 10 THEN total = total + 1
40 k = x / number
50 x = x + 1
60 OUTPUT k
70 NEXT x
80 OUTPUT x
error 1 .......................................................................................................................................
correction ..................................................................................................................................
...................................................................................................................................................
error 2 .......................................................................................................................................
correction ..................................................................................................................................
...................................................................................................................................................
error 3 .......................................................................................................................................
correction ..................................................................................................................................
...................................................................................................................................................
error 4 .......................................................................................................................................
correction ..................................................................................................................................
...................................................................................................................................................
error 5 .......................................................................................................................................
correction ..................................................................................................................................
...............................................................................................................................................[5]
© UCLES 2014
7
(b) The corrected algorithm was converted to a computer program and run. However, after
several numbers were input, the program stopped and an error message was generated,
showing that there was a further error at line 40 (k = x / number).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2014
8
• 20 megapixel resolution
• 32 gigabyte memory card
• autofocus facility
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
.......................................................................................................................................[1]
(b) (i) Describe the type of memory used in the memory card.
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
.......................................................................................................................................[1]
(ii) If a compressed image file requires an average of 1 byte per pixel, what is the maximum
number of photos that can be stored on the memory card?
...........................................................................................................................................
.......................................................................................................................................[1]
(d) Apart from autofocus, describe one other feature you would expect to see on a digital camera
controlled by a microprocessor.
...................................................................................................................................................
...............................................................................................................................................[1]
© UCLES 2014
9
8 The doors on a train are opened and closed automatically. Motors are used to operate the doors.
The system is controlled by a microprocessor.
Each door has a sensor which detects if a passenger enters or leaves the train as the doors are
closing. If a passenger is detected, the doors are automatically re-opened.
...............................................................................................................................................[1]
(b) If the sensor in one of the doors fails, describe a safety mechanism to prevent injury to a
passenger.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(c) Describe how the sensors, microprocessor and door motors interact to ensure a passenger
is not trapped in a closing door.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2014
12
10 (a) The flowchart on the next page shows how barcodes are used in a supermarket to find
product information and to produce orders for new stock automatically. Several statements
are missing from the flowchart.
Complete the flowchart, using item numbers only from the list below.
Item
Description
number
1 is barcode found?
2 is barcode read?
10 reduce number in stock by 1 and write new value back to the record
© UCLES 2014
13
START
No any more
barcodes to
scan?
Yes
scan barcode
STOP
No
Yes
No
Yes
Yes No
No Yes
[8]
© UCLES 2014
14
(b) Two devices used by the supermarket Point-Of-Sale (POS) terminal are a barcode reader
and a keyboard.
Name two other input/output devices used at the POS and give a use for each device.
device 1 ....................................................................................................................................
use ............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
device 2 ....................................................................................................................................
use ............................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
input number of
2
carats of gold
Values are input into cells B2, B3 and B5 and output is shown in cells C4 and C6.
© UCLES 2014
18
13 (a) Complete the truth table for the following logic circuit:
A B C Working X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
© UCLES 2014
19
(b) Re-draw the logic circuit shown opposite, using NAND and NOR gates only.
[2]
(c) Write a logic statement that describes the following logic circuit:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2014
20
START
sum1 = 0
sum2 = 0
total = 0
INPUT a, b, c, d, e, f
Yes
is a = 0 and STOP
b = 0?
No
total = total – 11
Yes
is total = 0? OUTPUT “data are OK”
No
No Yes
is total < 0? OUTPUT “error”
© UCLES 2014
21
Complete the trace table for this flowchart using the following data:
4, 3, 2, 0, 0, 8
5, 0, 1, 2, 3, 4
0, 0, 0, 0, 0, 0
[5]
© UCLES 2014